Cybersecurity Management

SOC, SIEM and Threat Hunting

Juan Vera - juanvvc@gmail.com

Page 1 of 69

A windows network might be very complex, with tens of thousand of devices talking to each other. Some services must be centralized in the Active Directory

The Active Directory (AD) is the central console to manage Windows systems inside a network. The AD centralizes authentication and permissions

Each user has different permissions on a Windows endpoint - local user / admin can access only this computer - domain users can access any computer in the network - domain admins manage the AD, they are not expected to access a computer... most of the time - SYSTEM: kernel level. Similar to root in Linux, but it does not have an assotiated user The objective of the attackers: control a domain account

There are automatic tools to run some of these processes: - vulnerability scanner: nessus, qualys, sentinel... https://owasp.org/www-community/Vulnerability_Scanning_Tools - threat managements: threatq (IOC management)... - threat intelligence: blueliv, cybelangel...

The link takes to a SANS poster with lots of information about the artifacts you can check to learn about the activity on a system: opened files, applications... It is a wonderful resource for information, updated often

- Windows events are not designed with security in mind - They are complex and not very well documented

Important applications, such as svchost (host of system services) has a very well know behaviour Any deviation is an alarm Can we monitor this behaviour